Monday 15 October 2012

COMPUTER SCIENCE AND APPLICATIONS QUESTION AND ANSWERS

COMPUTER SCIENCE AND APPLICATIONS QUESTIONS AND ANSWERS

1. The following features are needed to implement top down parsing
a. Source string maker
b. Prediction making mechanism
c. Matching and Backtracking mechanism
Ans. All of the above.

2. A macro definition consists of
a. A macro prototype statement
b. One or more model statements
c. Macro pre-processor statements
Ans. All of the above.

3. The main reason to encrypt a file is to
Ans. Secure it for transmission.

4.Which of the following is not a key piece of information, stored in single page table entry, assuming pure paging and virtual memory
Ans. A reference for the disk block that stores the page.

5. A UNIX device drive is
Ans. Structured into two halves called top half and bottom half.

6.The following is not a layer of IO management module
a.PICOS(Physical Input Output Control System)
b.LICOS(Logical Input Output Control System)
c. FS(File System)
Ans. MCS (Management Control System).

7. Which amongst the following is not a valid page replacement policy?
a. LRU Policy (Least Recently Used)
b.FIFO Policy (First in first out)
c.Optimal page replacement policy
Ans. RU policy (Recently Used)

8.An assembly language is a
Ans. Low level programming language.

9. TII stands for
Ans. Table of incomplete instruction.

10.An analysis, which determines the syntactic structure of the source statement, is called
Ans. Syntax analysis.

11. Action implementing instruction's meaning are actually carried out by
Ans. instruction execution.

12. The field containing a segment index or an internal index is called
Ans. Target datum.

13. A program in execution is called
Ans. Porcess.

14.Jobs which are admitted to the system processing is called
Ans. long-term scheduling.

15.A set of techniques that allow to execute a program which is not entirely in memory is called
Ans. Virtual memory.

16.SSTF stands for
Ans. Shortest-Seek-Time-First.

17. Before proceeding with its execution, each process must acquire all the resources it needs is called
Ans. hold and wait.

18. Virtual memory is
Ans. used in all major commercial operating systems.

19.Relocation bits used by relocating loader are specified by
Ans. Assembler or Translator.

20.Resolution of externally defined symbols is performed by
Ans. Linker.

21.Relocatable programs
Ans. Can be loaded almost anywhere in memory

22.page stealing
Ans. is taking page frames other working sets.

23. The total time to prepare a disk drive mechanism for a block of data to be read from its
Ans. Latency plus seek time.

24. To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is
Ans. One.

25.The memory allocation scheme subject to "external" fragmentation is
Ans. Segmentation.

26.Page fault frequency in an operating system is reduced when the
Ans. locally of references is applicable to the process.

27.In which of the following page replacement plicies Balady's anomly occurs?
Ans. FIFO (First in First Out)

28.Which of the following are language processors?
a. Assemblers
b. Compiler
c. Interpreter
Ans. All of the above.

29. Virtual memory can be implemented with
Ans. Segmentation, Paging

30.Recognition of basic syntatic constructs through reductions, this task is performed by
Ans. Syntax analysis.

31. A Grammar for  a programming language is a formal description of
Ans. Structure.

32.Swapping is a technique of temporarily removing inactive programs from the memory of computer system.

33. Ageing is a technique of improving the priority of process waiting in Queue for CPU allocation.

34.Latency Time is the required by a sector to reach below read/write head.

35. Which of the following is most general phase structured grammar?
a.Regular
b.Context-Free
Ans. Context- Sensitive.

36. File record length
Ans. Should be chosen to match the data characteristics.

37. A public key encryption system
Ans. Allows only the correct receiver to decode the data.

No comments:

Post a Comment